Advertisement

Election Cybersecurity

  • Judd Choate
  • Robert Smith
Chapter
Part of the Elections, Voting, Technology book series (EVT)

Abstract

The authors lay out the security framework and challenges that face election administration today, specifically focusing on cybersecurity and cyber threats. The chapter presents the current array of actors and initiatives involved addressing these threats and discusses cybersecurity challenges faced by local jurisdictions during the 2016 election. The authors then conclude the chapter with a discussion of ways these threats are being addressed.

Keywords

Cyber security Hacking Critical infrastructure 

References

  1. Agawu, Emefa Addo. “How to Think About Election Cybersecurity: A Guide for Policymakers.” April 3, 2018. https://www.newamerica.org/cybersecurity-initiative/policy-papers/how-to-think-about-election-cybersecurity/.
  2. Alvarez, R. Michael, Lonna Rae Atkeson, and Thad E. Hall. Evaluating Elections: A Handbook of Methods and Standards. New York: Cambridge University Press, 2013.Google Scholar
  3. DeSilver, Drew. “On Election Day, Most Voters Use Electronic or Optical-Scan Ballots.” Pew Research Center, November 8, 2016. http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/.
  4. Goudie, Chuck, and Christine Tressel. “How the Russians Penetrated Illinois Election Computers.” ABC 7 Live Chicago, July 19, 2018. https://abc7chicago.com/politics/how-the-russians-penetrated-illinois-election-computers/3778816/.
  5. Government Accountability Office. “Critical Infrastructure Protection: Additional Actions Are Essential for Assessing Cybersecurity Framework Adoption.” February 2018. https://www.gao.gov/assets/700/690112.pdf.
  6. Hale, Kathleen, and Christa Daryl Slaton. “Building Capacity in Election Administration: Responding to Complexity and Interdependence.” Public Administration Review, 68, no. 5 (2008): 839–849.CrossRefGoogle Scholar
  7. Hale, Kathleen, Mitchell Brown, and Robert Montjoy. Administering Elections: How American Elections Work. New York: Palgrave, 2015.CrossRefGoogle Scholar
  8. Hawkins, Derek, “The Cybersecurity 202: Voters’ Distrust of Election Security Is Just as Powerful as an Actual Hack, Officials Worry.” Washington Post, June 5, 2018. https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2018/06/05/the-cybersecurity-202-voters-distrust-of-election-security-is-just-as-powerful-as-an-actual-hack-officials-worry/5b1567091b326b08e883912f/?utm_term=.7a03e7805651.
  9. “Illinois Voter Registration System Database Breach Report.” n.d. https://www.intelligence.senate.gov/sites/default/files/documents/os-ssandvoss-062117_0.pdf.
  10. Jeh, Johnson. “Readout of Secretary Johnson’s Call with State Election Officials on Cybersecurity.” Department of Homeland Security, August 15, 2016. https://www.dhs.gov/news/2016/08/15/readout-secretary-johnsons-call-state-election-officials-cybersecurity.
  11. Levine, Mike. “Russia Likely Targeted All 50 States in 2016, but Has Yet to Try Again, DHS Cyber Chief Says.” ABC News, April 24, 2018. https://abcnews.go.com/US/russia-targeted-50-states-2016-dhs-cyber-chief/story?id=54695520.
  12. Mook, Robby, Matt Rhoades, and Eric Rosenbach. “The State and Local Election Cybersecurity Playbook.” Belfer Center for Science and International Affairs, Harvard Kennedy School, February 2018. https://www.belfercenter.org/publication/state-and-local-election-cybersecurity-playbook.
  13. Yaffa, Joshua. “Russia’s View of the Election Hacks: Denials, Amusement, Comeuppance.” The New Yorker, December 20, 2017. https://www.newyorker.com/news/news-desk/russias-view-of-the-election-hacks-denials-amusement-comeuppance.

Copyright information

© The Author(s) 2020

Authors and Affiliations

  • Judd Choate
    • 1
  • Robert Smith
    • 2
  1. 1.Colorado Department of StateDenverUSA
  2. 2.National Intelligence UniversityBethesdaUSA

Personalised recommendations